Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 16:44
Behavioral task
behavioral1
Sample
2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe
-
Size
146KB
-
MD5
16ca54f00e25ec6cb2266fc28739a2b1
-
SHA1
75ab9bef73c6970fa8523026c6830560e2aae779
-
SHA256
637ce282493007072aab316f69573813b8df253ed98685f7b302463f84e979fc
-
SHA512
df90d755c6c7246230321e310479f79d4c9adb173913f535f617f877217eb1986034256e996eb72575685326d60601192850aebe549d83a7a4fdb4378cbdcbbb
-
SSDEEP
3072:m6glyuxE4GsUPnliByocWepmhP+vHIN7yqzhuLl:m6gDBGpvEByocWegIvHIYihO
Malware Config
Signatures
-
Renames multiple (354) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1028 BCE9.tmp -
Executes dropped EXE 1 IoCs
pid Process 1028 BCE9.tmp -
Loads dropped DLL 1 IoCs
pid Process 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\ttchH9kiR.bmp" 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\ttchH9kiR.bmp" 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1028 BCE9.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCE9.tmp -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\WallpaperStyle = "10" 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ttchH9kiR\DefaultIcon 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ttchH9kiR 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ttchH9kiR\DefaultIcon\ = "C:\\ProgramData\\ttchH9kiR.ico" 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ttchH9kiR 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ttchH9kiR\ = "ttchH9kiR" 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp 1028 BCE9.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeDebugPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: 36 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeImpersonatePrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeIncBasePriorityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeIncreaseQuotaPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: 33 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeManageVolumePrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeProfSingleProcessPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeRestorePrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSystemProfilePrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeTakeOwnershipPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeShutdownPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeDebugPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeBackupPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe Token: SeSecurityPrivilege 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1028 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 32 PID 1924 wrote to memory of 1028 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 32 PID 1924 wrote to memory of 1028 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 32 PID 1924 wrote to memory of 1028 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 32 PID 1924 wrote to memory of 1028 1924 2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe 32 PID 1028 wrote to memory of 788 1028 BCE9.tmp 33 PID 1028 wrote to memory of 788 1028 BCE9.tmp 33 PID 1028 wrote to memory of 788 1028 BCE9.tmp 33 PID 1028 wrote to memory of 788 1028 BCE9.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-16_16ca54f00e25ec6cb2266fc28739a2b1_darkside.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\ProgramData\BCE9.tmp"C:\ProgramData\BCE9.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\BCE9.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD589e8c5d6d7e339e7c46beeaa24258b8c
SHA1d445d709d52616be8a5cd759520130ca516121a8
SHA256191af35fdb2dc1f0df868c844897c9c4a57fa8fb719cbd6d37f9ce60613a4db1
SHA512c8634e5fe9f5c6ba28551337a36f0802b269eb373789e4d4a8f1edebfcd535d0959ba2eac1e2ac0271bcda2ecf7c6b8ec56717a93c8d80e1e242b569db433529
-
Filesize
146KB
MD56d4d3c3ed973dd8c0ba42efbb8d0575f
SHA178b5ce28012f516306325b00f819ce35c3d6f75e
SHA2560a27e9ada4078b0cb6898af5be87ec68cb2238a5dde018692e92e62a76c7fe6f
SHA5121123793ed2209ee859413c6e2e26f16dd8d48fa34a9b74492c08975428e01e021c5ead86196d086fef7e07b7ebf06fe92a42eb0650702bebb4dacbd2b73736ce
-
Filesize
343B
MD572b1ffaeb7de456483f491ecceadb088
SHA1ee1953abc295245ab01f35a4a823883826bf2b41
SHA256eb892eac9899b995047733bb17acd4945eb42b7b49f2ee8ad52b8026bc0297a7
SHA512c0e7cad617cf1490bb25fc47936edc3ae164b190ed34f2d2a50e7e84ce6e0d6712a6ba9ab351cca1589266078326a00317516c53fecf96f20eaefe15e92ce445
-
Filesize
129B
MD55f41bfe5d78c28ab4935822b402039ab
SHA1fa01bf0b02dd567496c11f45f77c3376df3c71c7
SHA256ec1bb1a31a4b35e01823ec1a0ab5ebdca41f10615ef69eaf8b86fa29bd8fc719
SHA512778ebaa807715a0b3601d8d4844de1558f89860eac24468d3409d8f164d032bb0040b6b16d75e377397932a8f8fc6c466df8f3940bbb8f9c4d90e2fc18827523
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf